Misc Security

Misc Security

I have a website and we are going to implement some payment gateways for people who purchase items from my website. I do not know much about web security but I would like to know how the system works. I want to know how we can authentic the cards we will be receiving payment from.

 

  • 791 views
  • 2 answers
  • 0 votes

Hashed and salted passwords are used in cryptography to reduce password vulnerability to hash attacks. What is the process of hashing? What is the process of salting? How do hashing and salting work to protect passwords from brute attacks? In this context, what is fingerprinting?

  • 612 views
  • 1 answers
  • 0 votes

What is Cross Site Scripting? When do these occur? How is a cross site scripting attack executed? What are the categories of Cross Site Scripting Attacks? What is a Dom based XSS? Are XSS attacks severe and can they cause an account to be compromised? How can you protect a site from XSS attacks? 

  • 661 views
  • 1 answers
  • 0 votes

What is a Secure Socket Layer (SSL)?  How does SSL work? If you are a trader, why is it important that you have SSL on your website? How can you identify if a website has a SSL? Who issues a SSL certificate? What are the details that are included in the certificate?

  • 643 views
  • 2 answers
  • 0 votes

Symmetric encryption is faster but difficult to implement. Explain why? What is it also known as ?How does it work ?What is asymmetric encryption? What is its alternate name? What is its disadvantage? Explain the process of asymmetric encryption? What is the use of digital certificates in the process of asymmetric encryption?

  • 508 views
  • 1 answers
  • 0 votes
Folder containing some .exe files of some c-programs gets infected from some type of virus. I need to execute some .exe files for my project and anti-virus is not working even after updating the anti-virus. Suggest some solution for this problem or some way to execute .exe file without getting damaged my computer-system.
  • 927 views
  • 1 answers
  • 0 votes

I have 4 Desktops Computers running on Windows XP Pro 32-bit. I am having a trouble with the Symantec Endpoint Protection when I install version 12.3.1 it is always request for a reboot. When I reboot the PC’s the log on screen from windows does not appears. What do you think is the problem? I don’t encounter this problem on older version 11.0700.

  • 918 views
  • 1 answers
  • 0 votes

Hello,

I am facing a problem on some users where Certificate errors pops up. This happens to users using Microsoft outlook 2010. Any one have info related to this issue. We use exchange 2007 self signed stump. We only use trusted Certificate. 

Thanks 

  • 773 views
  • 1 answers
  • 0 votes

 

My computer is facing Anti Virus Security Pro issues. Whenever I try to boot my system in SAFE mode and enter my login details, it reboots again. What possible can be done to handle this issue? Please help

  • 652 views
  • 1 answers
  • 0 votes

 

Microsoft Security Essentials has detected some kind of malicious software on my PC. I received the following three alerts: Remove, Quarantine and Allow. What option should I select and why? Will the file be deleted or shifted to any other folder in the PC?

  • 623 views
  • 1 answers
  • 0 votes

Latest Articles

Benefits Of Storing And Sharing Documents In The Cloud

Have you ever wished you could access your important documents anytime, anywhere? With cloud document storage, that wish becomes a reality. In today’s fast-paced world, secure and accessible document management is more essential than...

From Lost To Found: Restore Your Data On Windows 11

Are you worried about data you lost during some operation on your Windows 11? Don’t worry; we are here to guide you on how to recover the lost data from your Windows device in...

How To Differentiate Demand Generation From Lead Generation

Lead generation and demand generation are two of the business strategies that help businesses grow. It creates a pipeline of interested customers looking to find out more. Lead generation on the contrary, is able...

Latest Blogs

Top 10 New Laptop Entrants That Shook The Public

The finest laptops are powerful enough to do your daily tasks, comfortable enough to use all day, and power-efficient enough to ensure you don't run out of battery power unexpectedly. Of course, all these...

10 Facts About The Dark Web

Before getting into knowing the facts, let’s have a brief about the Dark Web. The dark web is the data of the World Wide Web that is accessible only through special software, combinations, or...

Top 10 Latest Steam Cleaner Machines

While looking for a chemical-free way to clear and purify both durable and low grounds in your home, a steam cleaner is an excellent solution. With a spurt of superheated steam, this cleaning equipment...

Latest Tips

Top 10 Internet Monitoring Software

Internet monitoring software keeps a log of all internet activities. You can install this type of software on your computer remotely or by the administrator. An operating console controls this software. This type of...

Top 10 Best Partition Manager Software

A Hard Disk Drive is usually partitioned into various smaller drives for optimization. A partition manager helps make this process easier and more efficient. Here, let’s discuss the top 10 best partition manager software. 1....

Top 10 Best Online Music Production Software

Music production is the initial stage of any song. Music production can be done either in studios or at home using an online music production software. Here, let’s discuss the top 10 best online...